summaryrefslogtreecommitdiff
path: root/cleopatre/application/spidnetsnmp/snmplib/snmpTCPIPv6Domain.c
diff options
context:
space:
mode:
Diffstat (limited to 'cleopatre/application/spidnetsnmp/snmplib/snmpTCPIPv6Domain.c')
-rw-r--r--cleopatre/application/spidnetsnmp/snmplib/snmpTCPIPv6Domain.c496
1 files changed, 0 insertions, 496 deletions
diff --git a/cleopatre/application/spidnetsnmp/snmplib/snmpTCPIPv6Domain.c b/cleopatre/application/spidnetsnmp/snmplib/snmpTCPIPv6Domain.c
deleted file mode 100644
index b5dd727f97..0000000000
--- a/cleopatre/application/spidnetsnmp/snmplib/snmpTCPIPv6Domain.c
+++ /dev/null
@@ -1,496 +0,0 @@
-#include <net-snmp/net-snmp-config.h>
-
-#ifdef NETSNMP_TRANSPORT_TCPIPV6_DOMAIN
-
-/*
- * hack-o-matic for Cygwin to use winsock2
-*/
-#if defined(cygwin)
-#undef HAVE_UNISTD_H
-#undef HAVE_NETINET_IN_H
-#undef HAVE_ARPA_INET_H
-#undef HAVE_NET_IF_H
-#undef HAVE_NETDB_H
-#undef HAVE_SYS_PARAM_H
-#undef HAVE_SYS_SELECT_H
-#undef HAVE_SYS_SOCKET_H
-#undef HAVE_IN_ADDR_T
-#endif
-
-#include <stdio.h>
-#include <sys/types.h>
-#include <errno.h>
-
-#if HAVE_STRING_H
-#include <string.h>
-#else
-#include <strings.h>
-#endif
-#if HAVE_STDLIB_H
-#include <stdlib.h>
-#endif
-#if HAVE_UNISTD_H
-#include <unistd.h>
-#endif
-#if HAVE_SYS_SOCKET_H
-#include <sys/socket.h>
-#endif
-
-#if defined(HAVE_WINSOCK_H) || defined(cygwin)
- /*
- * Windows IPv6 support is part of WinSock2 only
- */
-#include <winsock2.h>
-#include <ws2tcpip.h>
-
-extern const char *inet_ntop(int, const void*, char*, size_t);
-
-#endif
-
-#if HAVE_NETINET_IN_H
-#include <netinet/in.h>
-#endif
-#if HAVE_ARPA_INET_H
-#include <arpa/inet.h>
-#endif
-#if HAVE_NETDB_H
-#include <netdb.h>
-#endif
-#if HAVE_FCNTL_H
-#include <fcntl.h>
-#endif
-
-#if HAVE_DMALLOC_H
-#include <dmalloc.h>
-#endif
-
-#include <net-snmp/types.h>
-#include <net-snmp/output_api.h>
-#include <net-snmp/config_api.h>
-
-#include <net-snmp/library/snmp_transport.h>
-#include <net-snmp/library/snmpUDPDomain.h>
-#include <net-snmp/library/snmpUDPIPv6Domain.h>
-#include <net-snmp/library/snmpTCPIPv6Domain.h>
-
-oid netsnmp_TCPIPv6Domain[] = { TRANSPORT_DOMAIN_TCP_IPV6 };
-static netsnmp_tdomain tcp6Domain;
-
-/*
- * Return a string representing the address in data, or else the "far end"
- * address if data is NULL.
- */
-
-static char *
-netsnmp_tcp6_fmtaddr(netsnmp_transport *t, void *data, int len)
-{
- struct sockaddr_in6 *to = NULL;
-
- DEBUGMSGTL(("netsnmp_tcp6", "fmtaddr: t = %p, data = %p, len = %d\n", t,
- data, len));
- if (data != NULL && len == sizeof(struct sockaddr_in6)) {
- to = (struct sockaddr_in6 *) data;
- } else if (t != NULL && t->data != NULL) {
- to = (struct sockaddr_in6 *) t->data;
- }
- if (to == NULL) {
- return strdup("TCP/IPv6: unknown");
- } else {
- char addr[INET6_ADDRSTRLEN];
- char tmp[INET6_ADDRSTRLEN + 18];
-
- sprintf(tmp, "TCP/IPv6: [%s]:%hd",
- inet_ntop(AF_INET6, (void *) &(to->sin6_addr), addr,
- INET6_ADDRSTRLEN), ntohs(to->sin6_port));
- return strdup(tmp);
- }
-}
-
-/*
- * You can write something into opaque that will subsequently get passed back
- * to your send function if you like. For instance, you might want to
- * remember where a PDU came from, so that you can send a reply there...
- */
-
-static int
-netsnmp_tcp6_recv(netsnmp_transport *t, void *buf, int size,
- void **opaque, int *olength)
-{
- int rc = -1;
-
- if (t != NULL && t->sock >= 0) {
- while (rc < 0) {
- rc = recvfrom(t->sock, buf, size, 0, NULL, 0);
- if (rc < 0 && errno != EINTR) {
- DEBUGMSGTL(("netsnmp_tcp6", "recv fd %d err %d (\"%s\")\n",
- t->sock, errno, strerror(errno)));
- return -1;
- }
- }
- DEBUGMSGTL(("netsnmp_tcp6", "recv fd %d got %d bytes\n", t->sock, rc));
- } else {
- return -1;
- }
-
- if (opaque != NULL && olength != NULL) {
- if (t->data_length > 0) {
- if ((*opaque = malloc(t->data_length)) != NULL) {
- memcpy(*opaque, t->data, t->data_length);
- *olength = t->data_length;
- } else {
- *olength = 0;
- }
- } else {
- *opaque = NULL;
- *olength = 0;
- }
- }
-
- return rc;
-}
-
-static int
-netsnmp_tcp6_send(netsnmp_transport *t, void *buf, int size,
- void **opaque, int *olength)
-{
- int rc = -1;
-
- if (t != NULL && t->sock >= 0) {
- while (rc < 0) {
- rc = sendto(t->sock, buf, size, 0, NULL, 0);
- if (rc < 0 && errno != EINTR) {
- break;
- }
- }
- }
- return rc;
-}
-
-static int
-netsnmp_tcp6_close(netsnmp_transport *t)
-{
- int rc = -1;
- if (t != NULL && t->sock >= 0) {
- DEBUGMSGTL(("netsnmp_tcp6", "close fd %d\n", t->sock));
-#ifndef HAVE_CLOSESOCKET
- rc = close(t->sock);
-#else
- rc = closesocket(t->sock);
-#endif
- t->sock = -1;
- }
- return rc;
-}
-
-static int
-netsnmp_tcp6_accept(netsnmp_transport *t)
-{
- struct sockaddr_in6 *farend = NULL;
- int newsock = -1, sockflags = 0;
- socklen_t farendlen = sizeof(struct sockaddr_in6);
- char *str = NULL;
-
- farend = (struct sockaddr_in6 *) malloc(sizeof(struct sockaddr_in6));
-
- if (farend == NULL) {
- /*
- * Indicate that the acceptance of this socket failed.
- */
- DEBUGMSGTL(("netsnmp_tcp6", "accept: malloc failed\n"));
- return -1;
- }
-
- if (t != NULL && t->sock >= 0) {
- newsock = accept(t->sock, (struct sockaddr *) farend, &farendlen);
-
- if (newsock < 0) {
- DEBUGMSGTL(("netsnmp_tcp6","accept failed rc %d errno %d \"%s\"\n",
- newsock, errno, strerror(errno)));
- free(farend);
- return newsock;
- }
-
- if (t->data != NULL) {
- free(t->data);
- }
-
- t->data = farend;
- t->data_length = farendlen;
- str = netsnmp_tcp6_fmtaddr(NULL, farend, farendlen);
- DEBUGMSGTL(("netsnmp_tcp6", "accept succeeded (from %s)\n", str));
- free(str);
-
- /*
- * Try to make the new socket blocking.
- */
-
-#ifdef WIN32
- ioctlsocket(newsock, FIONBIO, &sockflags);
-#else
- if ((sockflags = fcntl(newsock, F_GETFL, 0)) >= 0) {
- fcntl(newsock, F_SETFL, (sockflags & ~O_NONBLOCK));
- } else {
- DEBUGMSGTL(("netsnmp_tcp6", "accept: couldn't f_getfl of fd %d\n",
- newsock));
- }
-#endif
-
- /*
- * Allow user to override the send and receive buffers. Default is
- * to use os default. Don't worry too much about errors --
- * just plough on regardless.
- */
- netsnmp_sock_buffer_set(newsock, SO_SNDBUF, 1, 0);
- netsnmp_sock_buffer_set(newsock, SO_RCVBUF, 1, 0);
-
- return newsock;
- } else {
- free(farend);
- return -1;
- }
-}
-
-
-
-/*
- * Open a TCP/IPv6-based transport for SNMP. Local is TRUE if addr is the
- * local address to bind to (i.e. this is a server-type session); otherwise
- * addr is the remote address to send things to.
- */
-
-netsnmp_transport *
-netsnmp_tcp6_transport(struct sockaddr_in6 *addr, int local)
-{
- netsnmp_transport *t = NULL;
- int rc = 0;
- char *str = NULL;
-
- if (addr == NULL || addr->sin6_family != AF_INET6) {
- return NULL;
- }
-
- t = (netsnmp_transport *) malloc(sizeof(netsnmp_transport));
- if (t == NULL) {
- return NULL;
- }
- memset(t, 0, sizeof(netsnmp_transport));
-
- str = netsnmp_tcp6_fmtaddr(NULL, (void *)addr,
- sizeof(struct sockaddr_in6));
- DEBUGMSGTL(("netsnmp_tcp6", "open %s %s\n", local ? "local" : "remote",
- str));
- free(str);
-
- memset(t, 0, sizeof(netsnmp_transport));
-
- t->data = malloc(sizeof(struct sockaddr_in6));
- if (t->data == NULL) {
- netsnmp_transport_free(t);
- return NULL;
- }
- t->data_length = sizeof(struct sockaddr_in6);
- memcpy(t->data, addr, sizeof(struct sockaddr_in6));
-
- t->domain = netsnmp_TCPIPv6Domain;
- t->domain_length = sizeof(netsnmp_TCPIPv6Domain) / sizeof(oid);
-
- t->sock = socket(PF_INET6, SOCK_STREAM, 0);
- if (t->sock < 0) {
- netsnmp_transport_free(t);
- return NULL;
- }
-
- t->flags = NETSNMP_TRANSPORT_FLAG_STREAM;
-
- if (local) {
- int sockflags = 0, opt = 1;
-
- /*
- * This session is inteneded as a server, so we must bind on to the
- * given IP address, which may include an interface address, or could
- * be INADDR_ANY, but certainly includes a port number.
- */
-
-#ifdef IPV6_V6ONLY
- /* Try to restrict PF_INET6 socket to IPv6 communications only. */
- {
- int one=1;
- if (setsockopt(t->sock, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&one, sizeof(one)) != 0) {
- DEBUGMSGTL(("netsnmp_udp6", "couldn't set IPV6_V6ONLY to %d bytes: %s\n", one, strerror(errno)));
- }
- }
-#endif
-
- t->flags |= NETSNMP_TRANSPORT_FLAG_LISTEN;
- t->local = (unsigned char*)malloc(18);
- if (t->local == NULL) {
- netsnmp_tcp6_close(t);
- netsnmp_transport_free(t);
- return NULL;
- }
- memcpy(t->local, addr->sin6_addr.s6_addr, 16);
- t->local[16] = (addr->sin6_port & 0xff00) >> 8;
- t->local[17] = (addr->sin6_port & 0x00ff) >> 0;
- t->local_length = 18;
-
- /*
- * We should set SO_REUSEADDR too.
- */
-
- setsockopt(t->sock, SOL_SOCKET, SO_REUSEADDR, (void *)&opt, sizeof(opt));
-
- rc = bind(t->sock, (struct sockaddr *) addr,
- sizeof(struct sockaddr_in6));
- if (rc != 0) {
- netsnmp_tcp6_close(t);
- netsnmp_transport_free(t);
- return NULL;
- }
-
- /*
- * Since we are going to be letting select() tell us when connections
- * are ready to be accept()ed, we need to make the socket n0n-blocking
- * to avoid the race condition described in W. R. Stevens, ``Unix
- * Network Programming Volume I Second Edition'', pp. 422--4, which
- * could otherwise wedge the agent.
- */
-
-#ifdef WIN32
- opt = 1;
- ioctlsocket(t->sock, FIONBIO, &opt);
-#else
- sockflags = fcntl(t->sock, F_GETFL, 0);
- fcntl(t->sock, F_SETFL, sockflags | O_NONBLOCK);
-#endif
-
- /*
- * Now sit here and wait for connections to arrive.
- */
-
- rc = listen(t->sock, NETSNMP_STREAM_QUEUE_LEN);
- if (rc != 0) {
- netsnmp_tcp6_close(t);
- netsnmp_transport_free(t);
- return NULL;
- }
-
- /*
- * no buffer size on listen socket - doesn't make sense
- */
-
- } else {
- t->remote = (unsigned char*)malloc(18);
- if (t->remote == NULL) {
- netsnmp_tcp6_close(t);
- netsnmp_transport_free(t);
- return NULL;
- }
- memcpy(t->remote, addr->sin6_addr.s6_addr, 16);
- t->remote[16] = (addr->sin6_port & 0xff00) >> 8;
- t->remote[17] = (addr->sin6_port & 0x00ff) >> 0;
- t->remote_length = 18;
-
- /*
- * This is a client-type session, so attempt to connect to the far
- * end. We don't go non-blocking here because it's not obvious what
- * you'd then do if you tried to do snmp_sends before the connection
- * had completed. So this can block.
- */
-
- rc = connect(t->sock, (struct sockaddr *) addr,
- sizeof(struct sockaddr_in6));
-
- DEBUGMSGTL(("netsnmp_tcp6", "connect returns %d\n", rc));
-
- if (rc < 0) {
- netsnmp_tcp6_close(t);
- netsnmp_transport_free(t);
- return NULL;
- }
-
- /*
- * Allow user to override the send and receive buffers. Default is
- * to use os default. Don't worry too much about errors --
- * just plough on regardless.
- */
- netsnmp_sock_buffer_set(t->sock, SO_SNDBUF, local, 0);
- netsnmp_sock_buffer_set(t->sock, SO_RCVBUF, local, 0);
- }
-
- /*
- * Message size is not limited by this transport (hence msgMaxSize
- * is equal to the maximum legal size of an SNMP message).
- */
-
- t->msgMaxSize = 0x7fffffff;
- t->f_recv = netsnmp_tcp6_recv;
- t->f_send = netsnmp_tcp6_send;
- t->f_close = netsnmp_tcp6_close;
- t->f_accept = netsnmp_tcp6_accept;
- t->f_fmtaddr = netsnmp_tcp6_fmtaddr;
-
- return t;
-}
-
-/*
- * Not extern but still defined in snmpUDPIPv6Domain.c
- */
-extern int
-netsnmp_sockaddr_in6_2(struct sockaddr_in6*, const char*, const char*);
-
-netsnmp_transport *
-netsnmp_tcp6_create_tstring(const char *str, int local,
- const char *default_target)
-{
- struct sockaddr_in6 addr;
-
- if (netsnmp_sockaddr_in6_2(&addr, str, default_target)) {
- return netsnmp_tcp6_transport(&addr, local);
- } else {
- return NULL;
- }
-}
-
-
-/*
- * See:
- *
- * http://www.ietf.org/internet-drafts/draft-ietf-ops-taddress-mib-01.txt
- *
- * (or newer equivalent) for details of the TC which we are using for
- * the mapping here.
- */
-
-netsnmp_transport *
-netsnmp_tcp6_create_ostring(const u_char * o, size_t o_len, int local)
-{
- struct sockaddr_in6 addr;
-
- if (o_len == 18) {
- memset((u_char *) & addr, 0, sizeof(struct sockaddr_in6));
- addr.sin6_family = AF_INET6;
- memcpy((u_char *) & (addr.sin6_addr.s6_addr), o, 16);
- addr.sin6_port = (o[16] << 8) + o[17];
- return netsnmp_tcp6_transport(&addr, local);
- }
- return NULL;
-}
-
-
-void
-netsnmp_tcp6_ctor(void)
-{
- tcp6Domain.name = netsnmp_TCPIPv6Domain;
- tcp6Domain.name_length = sizeof(netsnmp_TCPIPv6Domain) / sizeof(oid);
- tcp6Domain.f_create_from_tstring_new = netsnmp_tcp6_create_tstring;
- tcp6Domain.f_create_from_ostring = netsnmp_tcp6_create_ostring;
- tcp6Domain.prefix = (const char**)calloc(4, sizeof(char *));
- tcp6Domain.prefix[0] = "tcp6";
- tcp6Domain.prefix[1] = "tcpv6";
- tcp6Domain.prefix[2] = "tcpipv6";
-
- netsnmp_tdomain_register(&tcp6Domain);
-}
-
-#endif /* NETSNMP_TRANSPORT_TCPIPV6_DOMAIN */
-